Computer Network Fundamentals Teacher Pack Final 0
Computer Network Fundamentals Teacher Pack Final 0
Course Type
Elective
Length of Course
It is envisioned that this course should take two classes to complete.
Resources required
Internet access is required to run the student presentation. (Produced using Microsoft Sway).
Projector and screen are required for display.
Good quality audio/video is required to listen to/watch the embedded YouTube videos.
Page |5
1. Lesson Plan
Lesson Number: 1 of 2
In-class Activity:
Watch all embedded YouTube videos
Lesson Number: 2 of 2
Method of Delivery: Sway presentation / online resources including a course, a game and a quiz -
https://sway.com/H1ifD5KUZdLWkhFz
In-class Activity:
Watch all embedded YouTube videos
Revision– complete an interactive course online
Revision – play an interactive game online
Revision – complete a quiz online
Learning Outcomes: Know the components of a network and understand the importance of
Network Security. Revise all concepts learned by completing a number of interactive resources
online.
Page |7
2. Topic Introduction
Open the Computer Network Fundamentals presentation and display on projector
screen: https://sway.com/H1ifD5KUZdLWkhFz. Navigate through the SWAY.
What is Networking?
A computer network is a set of two or more computers connected to each other. Once joined
together these computers can share files together and also share devices like printers which are on
the same network.
The network is connected with wires, either physical wires or wireless links, so the various separate
devices (known as nodes) can "talk" to one another and swap data. Nodes refer to desktop
computers, laptops, tablets, mobile phones, smart TVs and Gaming Consoles.
The network is probably one of the best inventions in the history of the computer because you
would not be sitting here now using Internet Explorer or Google Chrome (the world wide web –
www) to view this tutorial without networking technologies. Yes, the internet is also a large network.
Page |8
Network
technology helps us every day as we work and play!
Communication
People can communicate with others all over the world at a very low cost
using e-mail, chat, telephone, video telephone, video conferencing and SMS
(Short Message Service and is also commonly referred to as a "text message")
services
Sharing Resources
Sharing Software
Sharing Data
Users on a network can access data stored on other computers and on the
internet. Known as Databases, these systems are used in companies to hold
information such as customer, product or employee information. Database
information can be stored in-house on a computer server or in the Cloud.
Cloud Services allow companies to store their data in large online servers
using the internet. This makes this data accessible anywhere once there is an
internet connection.
Not all computer networks are the same - some are small and some are very large!
The smallest form of network is PAN (personal area network). PAN is used for communication
among computer devices, including mobiles phones, laptops and gaming consoles in a limited
area - approximately the size of a room! The reach of a PAN is generally only a few meters. This
network type is generally wireless. Bluetooth is an example of this type.
If you are using a computer in a school, you probably use a LAN (local area network). A LAN is
chosen as a network solution in a limited geographical area such as home, school, computer
laboratory or office building.
MANs (metropolitan area networks) cover a larger area than the LAN. As the name suggests,
MANs covers whole cities or large towns. Even some of the bigger universities opt for this
solution.
WANs (wide area networks) consists of several LANs connected together over the internet.
WANs covers the largest geographical area of all networks. The internet is an example of a WAN
that covers the entire world. (Woodford, 2016)
Bus Patterns - Each node attaches directly to a common single cable. The backbone functions as a
shared communication medium that devices
attach or tap into with an interface
connector. A device wanting to
communicate with another device on the
network sends a broadcast message onto
the wire that all other devices see, but only
the intended recipient actually accepts and
processes the message. Bus patterns work
best with a limited number of nodes. If
more than a few dozen computers are
added to a network bus, performance
problems may result. In addition, if the
backbone cable fails, the entire network effectively goes down.
Mesh is where all the network nodes are individually connected to most of the
other nodes. There is not a concept of a central switch, hub or computer
which acts as a central point of communication to pass on the messages.
Installation and configuration can be difficult and expensive in this
pattern however it is robust and provides security and privacy.
P a g e | 12
Network Design
Sometimes called “Network Architecture”, Network Design focuses on the configuration and
functionality of the network. There are two main designs:
Client/Server
Peer to Peer (P2P)
Client/Server
In a Client/Server Design, one computer or dedicated storage device acts as a central storage unit
for the network.
In this Network Design, one node acts as a server that provides the services, and the other nodes
(clients) request services from the server. Generally, a server is a powerful device with good
processing power and storage capacity.
Hubs / Switches
P a g e | 14
Routers
In addition to using switches, network technicians use "routers" to connect one local area network
(LAN) to another, many times across and across long geographic areas using commercial data
carriers.
A router has a lot more capabilities than hubs/ switches, as they can analyse the data being sent
over a network and send it to another network or over a different network. In home networks,
routers are commonly used to share an Internet connection between multiple computers.
In this example of a home network, a wireless router is being used to share out internet access to all
wi-fi enabled devices in the home. Additionally, by plugging in the hub/switch to the router, internet
access is also being shared to the two desktop computers wired into this network.
Cabling
Software (Protocols)
Software is required so all of the components function together. Network protocols define a
language of instructions for communication between the network nodes. It is essential that a
networked computer have one or more protocol drivers. Usually, for two computers to connect on a
network, they must use the same protocols. Network protocols like HTTP and TCP/IP offer a basis on
which much of the Internet stands.
Viruses: A small piece of software that can spread from one infected computer to another. The virus
could corrupt, steal, or delete data on your computer.
Trojan horses: Users can infect their computers with Trojan horse software by downloading an
application they thought was legitimate but was in fact malicious. Once inside your computer, a
Trojan horse can do anything from record your passwords to hijacking in-built video camera to
watch and record your every move.
Worms: They can copy themselves from one computer to another, without your interaction. They
can replicate in great volume and with great speed. For example, a worm can send copies of itself to
every contact in your email account.
P a g e | 16
Spam: This is unwanted messages appearing into your email inbox. Spam, or electronic junk mail, is
a nuisance as it can clutter your mailbox as well as potentially take up space on your mail server.
Phishing: Pronounced "Fishing"- these threats are fraudulent attempts by cybercriminals to obtain
private information. For example, you could receive a very legitimate looking email from your bank
trying to lure you into giving your personal information.
The first step is to make sure that all of your devices have the latest operating system, web browsers
and security software. This includes mobile devices that access your wi-fi network. This is the best
defence against viruses, phishing and other online threats.
Change the name and password of your router. When creating a new password, make sure it is long
and strong, using a mix of numbers, letters and symbols.
USBs and other external drive devices can be infected by viruses. Use your security software to scan
them.
If banking or shopping online, check to be sure the sites is security enabled. Look for web addresses
with “https://” or “shttp://,” which means the site takes extra measures to help secure your
information. “Http://” is not secure.
Back it up
Protect your valuable work, music, photographs and other digital information by making an
electronic copy and storing it safely. (Hayward, 2016)
P a g e | 17
http://flytrapinteractive.com/~personal/networking/Networking_Basics.swf
Hang the skeleton – play an interactive game to test your understanding of Networking
Fundamentals.
http://www.teach-ict.com/gcse_new/networks/computer_networks/quiz/hgm_networks.htm
https://forms.office.com/Pages/ResponsePage.aspx?id=z0c6mHesd0qIU_tNhYhZKBtkP7o_mKVBj-
tYrTzB_IRUNkpMU0sxR0k2TklXWk4zQlFaMlBRQzc2Ry4u
The quiz has been embedded in the SWAY presentation so you can complete it as an in-class
exercise.
Alternatively, the same quiz has been created in Kahoot, a free game-based learning platform that
makes it fun to learn.
Once logged in, press ‘Play’ and then ‘Start Now’. Select the ‘Classic’ player option on the left.
Now ask the students to go to kahoot.it and enter the Game PIN at the top of the screen.
Once they have done this, they can enter the quiz. It is against the clock so the fastest correct
answer gets the most points!
P a g e | 19
5. Industry Exposure
Prepare for a career in Networking – Things you can do straight away!
Be a good communicator
Sometimes called "Tech Support", the technician generally services, troubleshoots and fix problems
on the network. It will be helpful to know about the different operating systems such as Microsoft,
Novell and Unix. Investigate courses which include qualifications in Microsoft Technology Associate
(MTA), Cisco Career Certifications and CompTIA.
If you want to get into the admin side of networking, you should find out more about creating
network user accounts and managing resources on computers in the network. Experience in
correcting problems on the network involving nodes and peripherals will help.
To work in this area, you will have to perform tasks such as installing and configuring network
hardware and software, troubleshooting operations to ensure continuous network availability and
providing technical support and assistance.
A network analyst assesses the success of the current network solution always looking for
improvements. Their role is to research and coordinate system enhancements (updating software
and hardware). They also produce network policies and procedures.
P a g e | 21
6. Course Conclusion
Thank you for completing the Computer Network Fundamentals Taster Course and being part of the
GYIT programme.
All students who participate in the GYIT programme will also receive a Follow on Resource Pack.
This will comprise a comprehensive list of free and open source websites and tutorials so students
can continue on their programming journey.
For further information on the GYIT programme, please visit our website: Click here>>
P a g e | 22
7. Appendix
Hayward, D. (2016, April 17). How to secure your home network from hackers. Retrieved from
Trusted Reviews: http://www.trustedreviews.com/how-tos/how-to-secure-your-home-
network-from-hackers
Network Topologies. (2016, November 15). Retrieved from Edraw Visualiszation Solutions:
https://www.edrawsoft.com/Network-Topologies.php
Sanchez, M. (2010, December 9). The 10 most common security threats explained. Retrieved from
Blogs.cisco.com/: http://blogs.cisco.com/smallbusiness/the-10-most-common-security-
threats-explained
Understanding the differences between client/server and peer-to-peer networks. (2016, November
15). Retrieved from IT-ASEAN: http://it-asean.blogspot.ie/2014/10/understanding-
differences-between.html
Woodford, C. (2016, March 18). Computer Networks. Retrieved from Explain that stuff!:
http://www.explainthatstuff.com/howcomputernetworkswork.html